General

  • Target

    8ccb179fcd8faa6adea45558d2ce9f8137d717987b9b8db106d5607df732b460

  • Size

    1.2MB

  • Sample

    241111-hldqvaylar

  • MD5

    5531f35e2226a6f67799a3205b6fc301

  • SHA1

    211405312ee7bf331d7d33156b8fc49cc1b92cc0

  • SHA256

    8ccb179fcd8faa6adea45558d2ce9f8137d717987b9b8db106d5607df732b460

  • SHA512

    a5c5c1137f8acef3f7de76c9c575e4a00813e0680a20fc639540461b9991abdc5d7e0485cb9bdf433cda8ffa1ded82ffb1f6973956ccb94cddbaa8ca37033b37

  • SSDEEP

    24576:Ay/IQrDpDsccR4b3A3ViAPawAUm8YugM8+mEOKiPeukaaWvChZ:HbDOR4dAP/S88+FiP7mWah

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Targets

    • Target

      8ccb179fcd8faa6adea45558d2ce9f8137d717987b9b8db106d5607df732b460

    • Size

      1.2MB

    • MD5

      5531f35e2226a6f67799a3205b6fc301

    • SHA1

      211405312ee7bf331d7d33156b8fc49cc1b92cc0

    • SHA256

      8ccb179fcd8faa6adea45558d2ce9f8137d717987b9b8db106d5607df732b460

    • SHA512

      a5c5c1137f8acef3f7de76c9c575e4a00813e0680a20fc639540461b9991abdc5d7e0485cb9bdf433cda8ffa1ded82ffb1f6973956ccb94cddbaa8ca37033b37

    • SSDEEP

      24576:Ay/IQrDpDsccR4b3A3ViAPawAUm8YugM8+mEOKiPeukaaWvChZ:HbDOR4dAP/S88+FiP7mWah

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks